PoC-in-GitHub/2025/CVE-2025-44228.json
2025-08-31 03:36:30 +09:00

106 lines
No EOL
3.8 KiB
JSON

[
{
"id": 976180143,
"name": "Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"full_name": "Caztemaz\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"owner": {
"login": "Caztemaz",
"id": 209937297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209937297?v=4",
"html_url": "https:\/\/github.com\/Caztemaz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Caztemaz\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"description": "Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.",
"fork": false,
"created_at": "2025-05-01T16:35:56Z",
"updated_at": "2025-08-30T18:27:18Z",
"pushed_at": "2025-08-30T18:27:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-44228",
"cve-scanning",
"exploit",
"exploit-code",
"exploit-database",
"exploit-development",
"exploit-exercises",
"exploit-kit",
"exploitation",
"exploitation-framework",
"lnk",
"lnk-builder",
"lnk-cve",
"lnk-exploit",
"lnk-payloads",
"lnk-rce",
"lnk-shortcut",
"lnk-stomping",
"slient-exploit-builder"
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 976180146,
"name": "Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"full_name": "Caztemaz\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"owner": {
"login": "Caztemaz",
"id": 209937297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209937297?v=4",
"html_url": "https:\/\/github.com\/Caztemaz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Caztemaz\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"description": "Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.",
"fork": false,
"created_at": "2025-05-01T16:35:56Z",
"updated_at": "2025-08-30T18:25:09Z",
"pushed_at": "2025-08-30T18:25:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-44228",
"cve-scanning",
"doc",
"doc-builder",
"doc-cve",
"doc-exploit",
"doc-malware",
"doc-payloads",
"exploit",
"exploit-code",
"exploit-database",
"exploit-development",
"exploit-exercises",
"exploit-kit",
"exploitation",
"exploitation-framework",
"office",
"office-365",
"slient-exploit-builder"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]